Výsledky vyhledávání - Security and privacy Systems security Operating systems security Mobile platform security

  1. 1
  2. 2

    A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems Autor Krupp, Brian, Sridhar, Nigamanth, Wenbing Zhao

    ISSN: 1545-0678
    Vydáno: IEEE 01.07.2013
    “… In this paper, we discuss the components of a mobile operating system that require enhancements in the security and privacy controls that are inherent in modern mobile operating systems…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    Companiesandmarkets.com: Operating System and Hardware Platform Convergence is Simplifying Hacking; Boosting Growth Potential in the Mobile Security Market

    Vydáno: New York Business Wire 03.10.2011
    Vydáno v Business Wire (03.10.2011)
    “… consumer interest in mobile computing equipment and smartphones are contributing to an increase in potential security and privacy risks, according to a new report…”
    Získat plný text
    Newsletter
  4. 4
  5. 5

    Fortinet(r): Fortinet Announces Carrier-Specific Multi-Threat Security Platform, Supports Cloud-Based Security Services; New FortiCarrier Operating System and Hardware Platform Bring Unique Carrier-Grade Capabilities for VOIP, Mobile Content Security

    Vydáno: Coventry Normans Media Ltd 05.05.2009
    Vydáno v M2 Presswire (05.05.2009)
    “…: securing voice-over-IP infrastructures and mobile operator content, and enabling automated provisioning and management of security policies on a per-user basis…”
    Získat plný text
    Newsletter
  6. 6
  7. 7

    F-Secure Ships Mobile Antivirus for Newest Series 60 Smartphones; Security Vendor Offers Protection for Newest Symbian OS Platform; World's Most Common Mobile Phone Operating System

    Vydáno: New York PR Newswire Association LLC 04.05.2006
    Vydáno v PR Newswire (04.05.2006)
    “… 3.0 with support for S60 3rd Edition platform, the newest generation of the world's leading smartphone software operating system from Symbian…”
    Získat plný text
    Newsletter
  8. 8
  9. 9
  10. 10

    Addonics Announces Advanced Platform, Software and Operating System Independent Hard Drive Security Solution for Mobile User's Sensitive Data

    Vydáno: New York Business Wire 23.08.2010
    Vydáno v Business Wire (23.08.2010)
    “…Among the features of the Cipher Drive SC are Smart Card + PIN authentication; full disk hardware encryption using AES 256-bit key strength; an…”
    Získat plný text
    Newsletter
  11. 11

    ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications Autor Zhan, Xian, Fan, Lingling, Chen, Sen, We, Feng, Liu, Tianming, Luo, Xiapu, Liu, Yang

    ISBN: 1665402962, 9781665402965
    ISSN: 1558-1225
    Vydáno: IEEE 01.05.2021
    “…Third-party libraries (TPLs) as essential parts in the mobile ecosystem have become one of the most significant contributors to the huge success of Android, which facilitate the fast development of Android applications…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    sNPU: Trusted Execution Environments on Integrated NPUs Autor Feng, Erhu, Feng, Dahu, Du, Dong, Xia, Yubin, Chen, Haibo

    Vydáno: IEEE 29.06.2024
    “…Trusted execution environment (TEE) promises strong security guarantee with hardware extensions for security-sensitive tasks…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    RAP-Track: Efficient Control Flow Attestation via Parallel Tracking in Commodity MCUs Autor Neto, Antonio Joia, Caulfield, Adam, De Oliveira Nunes, Ivan

    Vydáno: IEEE 22.06.2025
    “…Control Flow Attestation (CFA) has emerged as an important security service to enable remote verification of control flow paths in safety-critical embedded systems…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities Autor Su, Jianzhong, Lin, Xingwei, Fang, Zhiyuan, Zhu, Zhirong, Chen, Jiachi, Zheng, Zibin, Lv, Wei, Wang, Jiashui

    ISSN: 2643-1572
    Vydáno: IEEE 11.09.2023
    “… However, the vulnerabilities hiding in the smart contracts of DeFi apps have resulted in numerous security incidents, with most of them leading to funds (tokens…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious Components Autor Liu, Zhijie, Zhang, Liang Feng, Tang, Yutian

    ISSN: 2643-1572
    Vydáno: IEEE 11.09.2023
    “…Existing Android malware detection systems primarily concentrate on detecting malware apps, leaving a gap in the research concerning the detection of malicious components in apps…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators Autor Zhou, Mingyi, Gao, Xiang, Chen, Xiao, Chen, Chunyang, Grundy, John, Lit, Li

    ISSN: 2643-1572
    Vydáno: ACM 27.10.2024
    “…Deploying deep learning (DL) models on mobile applications (Apps) has become ever-more popular…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense Autor Ma, Zheyuan, Tan, Xi, Ziarek, Lukasz, Zhang, Ning, Hu, Hongxin, Zhao, Ziming

    Vydáno: IEEE 09.07.2023
    “… technique, namely return-to-non-secure (ret2ns). We experimentally confirmed the feasibility of four variants of ret2ns attacks on two Cortex-M hardware systems…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    How Android Apps Break the Data Minimization Principle: An Empirical Study Autor Zhang, Shaokun, Lei, Hanwen, Wang, Yuanpeng, Li, Ding, Guo, Yao, Chen, Xiangqun

    ISSN: 2643-1572
    Vydáno: IEEE 11.09.2023
    “…The Data Minimization Principle is crucial for protecting individual privacy. However, existing Android runtime permissions do not guarantee this principle…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    An Industrial Practice for Securing Android Apps in the Banking Domain Autor Malviya, Vikas K., Phan, Phong, Tun, Yan Naing, Ching, Albert, Shar, Lwin Khin

    ISSN: 2643-1572
    Vydáno: IEEE 11.09.2023
    “… Mobile banking has a lot of advantages, but it also has security concerns. Illegal access to personal and financial information often occurs due to lapses in mobile security…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs Autor Meng, Shi, Wang, Liu, Wang, Shenao, Wang, Kailong, Xiao, Xusheng, Bai, Guangdong, Wang, Haoyu

    ISSN: 2643-1572
    Vydáno: IEEE 11.09.2023
    “… However, MiniApps raise new security and privacy concerns as they can access partially or all of host apps' system resources, including sensitive personal data…”
    Získat plný text
    Konferenční příspěvek